Vigilance™ Managed Firewall
Intrinium Vigilance™ Firewall is a comprehensive solution that has the flexibility to grow with your organization and budget. We provide firewall protection between your network and the internet, protecting your business against hacking, viruses, fraud, and internal threats.
The Vigilance™ Firewall Management Service will provide:
24x7x365 Protection of Network Data
Uptime & Availability
Supporting Compliance Requirements
Maintain compliance gaps requiring perimeter security, access control, and log analysis to satisfy compliance requirements of PCI, HIPAA, ISO and (other standards) to demonstrate compliance and control to auditors and leadership of all levels.
Management & Monitoring
Vigilance™ Endpoint Monitoring Service
Endpoint security is the last line of defense. It is the software or agent directly attached to the User’s every move. Simply having anti-virus and anti-malware is not going to save your network. However, by utilizing the centralized component of your organization’s Endpoint Security, we will monitor the events and health of your Endpoints. Advanced threats will evade information security controls. This service improves awareness with our 24x7x365 team at the helm to detect signs of endpoint compromise in real-time.
Monitoring & Alerting
- We see a threat activity in real time.
- We save you money by pinpoint the affected systems
- quickly allowing for immediate incident response.
- Immediate notification to your key
- Decision makers when if/or when an incident occurs.
- High alert response time under 4 hours.
Vigilance™ Intrusion Detection & Prevention Service
Management of the Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) devices is complex. We allow you to optimize productivity by allowing us to keep yours tuned to the current threats and the network within your unique network.
Monitoring & Alerting
- Receive remediation assistance and security consultation.
customizable support for even the most complex environments.
By Samantha Agather, Information Security Analyst– Intrinium Have an incident? We can help. When things go wrong regarding your company’s data, it can be terrifying. It will leave you wondering, what’s the full extent of the damage done, how did it happen and what’s...
External Network Vulnerability Scans vs. Internal Network Vulnerability Scans: Why Both are Important
By Johnathan Dunlap – Information Security Associate – Intrinium When it comes to security, threats can come from anywhere. That is why we recommend utilizing both external and internal vulnerability scans to understand the breadth of vulnerabilities within and...
By Stephen Heath - Partner and Advisory CISO - Intrinium This story is all too familiar. Accidents happen but, what if that mistake could cost you the security of your company? An employee left their laptop in their car and came back to a broken window and stolen...
By Samantha Agather, Information Security Analyst- Intrinium A Hitchhiker’s Guide to Firewall Management Services As a business owner, you want to keep your data safe. But what if your firewall fails and customer information is stolen, or you lose the person...
By Stephen Heath - Partner and Advisory CISO - Intrinium A relatively sophisticated spear phishing attack has been reported by InfoSec journalist Brian Krebs of Krebs on Security that appears to target many US financial institutions, including Banks and Credit...
The Health Information Technology for Economic and Clinical Health (HITECH) Act changed the HIPAA requirements for notifications after a breach.
Chiara Morrison - Manager, Marketing Spokane Mayor's Cyber Cup 2019 Chiara Morrison sat down to interview the creator of Spokane Mayor’s Cyber Cup 2019, Max Dulin, Senior at Gonzaga University, Computer Science Major. Chiara: Max, can you tell me a little bit about...
Chiara Morrison - Manager, Marketing What is an Internal Vulnerability Test? The Intrinium Internal Vulnerability Assessment evaluates IT security from the inside of your organization and identifies critical vulnerabilities that could be exploited by attackers that...
Chiara Morrison - Manager, Marketing What is a Risk Assessment? Risk Assessment is the combined effort of executing the following: 1. Identifying and analyzing potential (future) events that may negatively impact individuals, assets, and/or the environment (i.e.,...
Chiara Morrison - Manager, Marketing All businesses, large and small, face the growing challenge of Information Security within the organization. As an SMB, we know you want to protect your clients’ data and meet compliance requirements without allocating a...